Analysis

  • max time kernel
    149s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 20:21

General

  • Target

    0872311eba59f44fe5232d52968dabc93992a79552c42ffc5c4e6336ed409118.exe

  • Size

    1.2MB

  • MD5

    021e6b3f607c727ba08ee988206c4567

  • SHA1

    0bd4f98586dfb251d9744e49aa50110e626889b1

  • SHA256

    0872311eba59f44fe5232d52968dabc93992a79552c42ffc5c4e6336ed409118

  • SHA512

    447d3f72c12db4ec4c80526a8692e66c6e557eb24cbdae6595ce386b8c49c7733de1438ee5dcfcb638fab4e099024bcdab8b8ff97357585cf614323df5dc9bb3

  • SSDEEP

    24576:Oyxu92jx9/Kcy3yOIEXuHFDTPrSkGXs77+Fu7BgF3MWIYwu5/xVF8UwyCQ:dw2WcI1zXOvEW7+U9gF3WYwu5KBy

Malware Config

Extracted

Family

redline

Botnet

gena

C2

185.161.248.73:4164

Attributes
  • auth_value

    d05bf43eef533e262271449829751d07

Extracted

Family

redline

Botnet

life

C2

185.161.248.73:4164

Attributes
  • auth_value

    8685d11953530b68ad5ec703809d9f91

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0872311eba59f44fe5232d52968dabc93992a79552c42ffc5c4e6336ed409118.exe
    "C:\Users\Admin\AppData\Local\Temp\0872311eba59f44fe5232d52968dabc93992a79552c42ffc5c4e6336ed409118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z39739129.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z39739129.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z41836049.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z41836049.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4084
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z33335380.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z33335380.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:2968
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3088
            • C:\Windows\Temp\1.exe
              "C:\Windows\Temp\1.exe"
              6⤵
              • Executes dropped EXE
              PID:4636
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t71629403.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t71629403.exe
            5⤵
            • Executes dropped EXE
            PID:2188

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z39739129.exe

    Filesize

    1.0MB

    MD5

    efd9b1c7975bc7491ce75de32975d7ed

    SHA1

    8514288b134169f8ccbe8d6d39f577fb99da2be3

    SHA256

    32b8da0dddccf37a2360f859e4a8cdf3a5b9405412819fb6374c36a75b4dc35e

    SHA512

    f1cd1c852c0d93b59a133b9a3b6efc5d46ab1a2a6d68244c3866a9d4bb83b4c19ac955ed825cca9c9b645389e6c5bce9f2c4ceeaadb1a5ccd29cd762bee4e421

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z39739129.exe

    Filesize

    1.0MB

    MD5

    efd9b1c7975bc7491ce75de32975d7ed

    SHA1

    8514288b134169f8ccbe8d6d39f577fb99da2be3

    SHA256

    32b8da0dddccf37a2360f859e4a8cdf3a5b9405412819fb6374c36a75b4dc35e

    SHA512

    f1cd1c852c0d93b59a133b9a3b6efc5d46ab1a2a6d68244c3866a9d4bb83b4c19ac955ed825cca9c9b645389e6c5bce9f2c4ceeaadb1a5ccd29cd762bee4e421

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z41836049.exe

    Filesize

    764KB

    MD5

    c4bd3c6b808b5dbfede5a0a9881878ab

    SHA1

    8e716c01ddb6f8ed17e21c0fe8db279cf9e0c66c

    SHA256

    684c6af080124e841b27b28dc2b6ed628fd1be63adf1a88b31054a33b2967743

    SHA512

    8b7f067fd09be91be3699f7c946595de848969a442ca33389224c6076aca4d42fb2a2e94e34cce7e9d43761c85dda259d75db9ac43c26769cb5c9176255696a0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z41836049.exe

    Filesize

    764KB

    MD5

    c4bd3c6b808b5dbfede5a0a9881878ab

    SHA1

    8e716c01ddb6f8ed17e21c0fe8db279cf9e0c66c

    SHA256

    684c6af080124e841b27b28dc2b6ed628fd1be63adf1a88b31054a33b2967743

    SHA512

    8b7f067fd09be91be3699f7c946595de848969a442ca33389224c6076aca4d42fb2a2e94e34cce7e9d43761c85dda259d75db9ac43c26769cb5c9176255696a0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z33335380.exe

    Filesize

    581KB

    MD5

    509abe7f7d2a406e26f1b3a059a9153a

    SHA1

    624ed5e67367a8db5b6f01e6debe0da97fe08257

    SHA256

    88e93816db25b2c4955dc92f1528d6faf8c3d04a1d0c5dc68d27f3b04e43daa0

    SHA512

    691e8334256cf8b42fcedb2c360a795ae061e6ea820a068a9324cafb4f04a7f7205f08be4e50afd4f959f4a751871435baf1bfd95a9a7eac077ef107939b9623

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z33335380.exe

    Filesize

    581KB

    MD5

    509abe7f7d2a406e26f1b3a059a9153a

    SHA1

    624ed5e67367a8db5b6f01e6debe0da97fe08257

    SHA256

    88e93816db25b2c4955dc92f1528d6faf8c3d04a1d0c5dc68d27f3b04e43daa0

    SHA512

    691e8334256cf8b42fcedb2c360a795ae061e6ea820a068a9324cafb4f04a7f7205f08be4e50afd4f959f4a751871435baf1bfd95a9a7eac077ef107939b9623

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe

    Filesize

    582KB

    MD5

    83324ec99eb7c6f0523fdf097a6e7ad7

    SHA1

    f1d6feb3f220ec69a14b265da021d968a9083d61

    SHA256

    6af01d4be3b3270b3d11e175309288e7fbdb12db4fb2d8f1ef100cfd61a777d6

    SHA512

    ffd513e1518df107b45f52769d6ef8c55c6c90742c57adfffb6207458e99785066f8bfd35094b8c258ecf71b86835ce2d8315b997a608f70476b0cf7cf20e7d4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s69671186.exe

    Filesize

    582KB

    MD5

    83324ec99eb7c6f0523fdf097a6e7ad7

    SHA1

    f1d6feb3f220ec69a14b265da021d968a9083d61

    SHA256

    6af01d4be3b3270b3d11e175309288e7fbdb12db4fb2d8f1ef100cfd61a777d6

    SHA512

    ffd513e1518df107b45f52769d6ef8c55c6c90742c57adfffb6207458e99785066f8bfd35094b8c258ecf71b86835ce2d8315b997a608f70476b0cf7cf20e7d4

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t71629403.exe

    Filesize

    169KB

    MD5

    0f471d78632d22fa173eef2e9fc30770

    SHA1

    256db7496f80290c1fec79a04b7bc8896be08f21

    SHA256

    f6cb2745d0321b6fac9a5c22b5b7968f81bd845db27c200d6573934d42de6ac1

    SHA512

    0f9315b331ba1d9317a18d28abf5f6d31966feac4101d5a493e670e4f73a2e856a97a38d48d999e8d7faccde4d1ab444e5cec203904d4c34e116045a43e8d8c5

  • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t71629403.exe

    Filesize

    169KB

    MD5

    0f471d78632d22fa173eef2e9fc30770

    SHA1

    256db7496f80290c1fec79a04b7bc8896be08f21

    SHA256

    f6cb2745d0321b6fac9a5c22b5b7968f81bd845db27c200d6573934d42de6ac1

    SHA512

    0f9315b331ba1d9317a18d28abf5f6d31966feac4101d5a493e670e4f73a2e856a97a38d48d999e8d7faccde4d1ab444e5cec203904d4c34e116045a43e8d8c5

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    f16fb63d4e551d3808e8f01f2671b57e

    SHA1

    781153ad6235a1152da112de1fb39a6f2d063575

    SHA256

    8a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581

    SHA512

    fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf

  • memory/2188-2338-0x0000000000FE0000-0x000000000100E000-memory.dmp

    Filesize

    184KB

  • memory/2188-2346-0x0000000005950000-0x0000000005960000-memory.dmp

    Filesize

    64KB

  • memory/2188-2344-0x0000000005950000-0x0000000005960000-memory.dmp

    Filesize

    64KB

  • memory/2188-2340-0x0000000005B70000-0x0000000005C7A000-memory.dmp

    Filesize

    1.0MB

  • memory/2188-2339-0x0000000006080000-0x0000000006698000-memory.dmp

    Filesize

    6.1MB

  • memory/3088-194-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-212-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-171-0x0000000002550000-0x0000000002560000-memory.dmp

    Filesize

    64KB

  • memory/3088-170-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-174-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-176-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-178-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-180-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-182-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-184-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-186-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-188-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-190-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-192-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-168-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-196-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-198-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-200-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-202-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-204-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-206-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-208-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-210-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-173-0x0000000002550000-0x0000000002560000-memory.dmp

    Filesize

    64KB

  • memory/3088-214-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-216-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-218-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-220-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-222-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-224-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-226-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-228-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-230-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-2315-0x0000000002550000-0x0000000002560000-memory.dmp

    Filesize

    64KB

  • memory/3088-2316-0x0000000002550000-0x0000000002560000-memory.dmp

    Filesize

    64KB

  • memory/3088-2317-0x0000000002550000-0x0000000002560000-memory.dmp

    Filesize

    64KB

  • memory/3088-166-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-165-0x0000000002A30000-0x0000000002A90000-memory.dmp

    Filesize

    384KB

  • memory/3088-164-0x0000000005140000-0x00000000056E4000-memory.dmp

    Filesize

    5.6MB

  • memory/3088-2321-0x0000000002550000-0x0000000002560000-memory.dmp

    Filesize

    64KB

  • memory/3088-162-0x0000000000910000-0x000000000096B000-memory.dmp

    Filesize

    364KB

  • memory/3088-163-0x0000000002550000-0x0000000002560000-memory.dmp

    Filesize

    64KB

  • memory/4636-2342-0x0000000005350000-0x000000000538C000-memory.dmp

    Filesize

    240KB

  • memory/4636-2343-0x0000000002C20000-0x0000000002C30000-memory.dmp

    Filesize

    64KB

  • memory/4636-2341-0x00000000052F0000-0x0000000005302000-memory.dmp

    Filesize

    72KB

  • memory/4636-2345-0x0000000002C20000-0x0000000002C30000-memory.dmp

    Filesize

    64KB

  • memory/4636-2334-0x0000000000850000-0x000000000087E000-memory.dmp

    Filesize

    184KB